Loading HuntDB...

Recently Updated CVEs

Latest Updates

Most recently updated vulnerabilities, including new information, EPSS scores, and exploit discoveries.

CVE-2025-48502 Updated 1 day, 17 hours ago

Improper input validation within AMD uprof can allow a local attacker to overwrite MSR registers, potentially resulting in crash or denial of service.

None (0.0)
CVE-2025-13524 Updated 1 day, 17 hours ago

Improper resource release in the call termination process in AWS Wickr before version 6.62.13 on Windows, macOS and Linux may allow a call participant to continue receiving audio input from another user after they close their call window. This issue occurs under certain conditions, which require the affected user to take a particular action within the application To mitigate this issue, users should upgrade AWS Wickr, Wickr Gov and Wickr Enterprise desktop version to version 6.62.13.

None (0.0)
CVE-2025-11931 Updated 1 day, 17 hours ago

Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt. This issue is hit specifically with a call to the function wc_XChaCha20Poly1305_Decrypt() which is not used with TLS connections, only from direct calls from an application.

UNKNOWN (0.0)
CVE-2023-30806 Updated 1 day, 23 hours ago

The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /cgi-bin/login.cgi endpoint. This is due to mishandling of shell meta-characters in the PHPSESSID cookie.

CRITICAL (9.8) EPSS: 17.0%
CVE-2011-10013 Updated 2 days ago

Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowing unauthenticated users to reach admin-only functionality. This can be exploited via plugins.php to inject and execute arbitrary PHP code.

UNKNOWN (0.0)
CVE-2024-7954 Updated 2 days, 1 hour ago

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.

CRITICAL (9.8) EPSS: 93.8% 1 exploit
SPIP Porte Plume Plugin - Rem…
CVE-2024-7314 Updated 2 days, 1 hour ago

anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.

CRITICAL (9.8) EPSS: 79.4% 1 exploit
AJ-Report < 1.4.1 - Remote Co…
CVE-2024-23692 Updated 2 days, 1 hour ago

Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported.

CRITICAL (9.8) EPSS: 94.3%
CVE-2024-23690 Updated 2 days, 1 hour ago

The end-of-life Netgear FVS336Gv2 and FVS336Gv3 are affected by a command injection vulnerability in the Telnet interface. An authenticated and remote attacker can execute arbitrary OS commands as root over Telnet by sending crafted "util backup_configuration" commands.

HIGH (7.2) EPSS: 0.5%
CVE-2024-13976 Updated 2 days, 1 hour ago

A DLL injection vulnerability exists in Commvault for Windows 11.20.0, 11.28.0, 11.32.0, 11.34.0, and 11.36.0. During the installation of maintenance updates, an attacker with local access may exploit uncontrolled search path or DLL loading behavior to execute arbitrary code with elevated privileges. The vulnerability has been resolved in versions 11.20.202, 11.28.124, 11.32.65, 11.34.37, and 11.36.15.

UNKNOWN (0.0)
CVE-2024-13975 Updated 2 days, 1 hour ago

A local privilege escalation vulnerability exists in Commvault for Windows versions 11.20.0, 11.28.0, 11.32.0, 11.34.0, and 11.36.0. In affected configurations, a local attacker who owns a client system with the file server agent installed can compromise any assigned Windows access nodes. This may allow unauthorized access or lateral movement within the backup infrastructure. The issue has been resolved in versions 11.32.60, 11.34.34, and 11.36.8.

UNKNOWN (0.0)
CVE-2024-12856 Updated 2 days, 1 hour ago

The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue.

HIGH (7.2) EPSS: 77.2%
CVE-2024-12847 Updated 2 days, 1 hour ago

NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending crafted HTTP requests to the setup.cgi endpoint. This vulnerability has been exploited in the wild since at least 2017 and specifically by the Shadowserver Foundation on 2025-02-06 UTC.

CRITICAL (9.8) EPSS: 0.1%
CVE-2024-11680 Updated 2 days, 1 hour ago

ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.

CRITICAL (9.8) EPSS: 93.6%
CVE-2025-60711 Updated 2 days, 9 hours ago

No description available

MEDIUM (6.3)
CVE-2025-59503 Updated 2 days, 9 hours ago

No description available

CRITICAL (10.0)
CVE-2025-59502 Updated 2 days, 9 hours ago

No description available

HIGH (7.5)
CVE-2025-59501 Updated 2 days, 9 hours ago

No description available

MEDIUM (4.8)
CVE-2025-59500 Updated 2 days, 9 hours ago

No description available

HIGH (7.7)
CVE-2025-59497 Updated 2 days, 9 hours ago

No description available

HIGH (7.0)